Network Peripherals a Short overview

Peripherals
For Network Peripherals we will be looking for Hardware that is not (directly) connected to the network.
Devices like these are attached — temporarily or permanently — to a component of the network.

Some of such peripherals are potential points-of-failure of the security infrastructure.
To limit those potential there must be policy, procedure and process for reducing risk and/or exposure of these devices..